Anonymous yet accountable access control, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, 2005. ,
DOI : 10.1145/1102199.1102208
A Cryptographic Framework for the Controlled Release of Certified Data, Security Protocols Workshop, pp.20-42, 2004. ,
DOI : 10.1007/3-540-45682-1_31
Anonymous credentials on a standard java card, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.600-610, 2009. ,
DOI : 10.1145/1653662.1653734
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.668
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 2000. ,
Direct anonymous attestation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.132-145, 2004. ,
DOI : 10.1145/1030083.1030103
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.5041
Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes, Advances in Cryptology ASIACRYPT 2000, pp.331-345, 1976. ,
DOI : 10.1007/3-540-44448-3_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.3443
anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.21-30, 2002. ,
DOI : 10.1145/586110.586114
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, EUROCRYPT, pp.93-118, 2001. ,
DOI : 10.1007/3-540-44987-6_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.7938
A card requirements language enabling privacy-preserving access control, Proceeding of the 15th ACM symposium on Access control models and technologies, SACMAT '10, pp.119-128, 2010. ,
DOI : 10.1145/1809842.1809863
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.654.3127
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures, SEC, pp.25-37, 2006. ,
DOI : 10.1007/0-387-33406-8_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.1081
Security issues in m-commerce: A usage-based taxonomy. e-commerce agents, LNAI, pp.264-282, 2001. ,
Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985. ,
DOI : 10.1145/4372.4373
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.319.3690
Analysis and design of an advanced infrastructure for secure and anonymous electronic payment systems on the Internet, 2002. ,
Smart Card Integration in the pseudonym system idemix, 2007. ,
A One-Time Password Scheme with QR-Code Based on Mobile Phone, 2009 Fifth International Joint Conference on INC, IMS and IDC, pp.2069-2071, 2009. ,
DOI : 10.1109/NCM.2009.324
Restlet: Official Developer's Guide to Restful Web Applications in Java, Apress, 2010. ,
Shake Well Before Use: Authentication Based on Accelerometer Data, Pervasive Computing, pp.144-161, 2007. ,
DOI : 10.1007/978-3-540-72037-9_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.9793
Seeing-Is-Believing: using camera phones for human-verifiable authentication, International Journal of Security and Networks, vol.4, issue.1/2, pp.43-56, 2009. ,
DOI : 10.1504/IJSN.2009.023425
Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards, 7th International ICST Conference on Security and Privacy in Communication Networks Proceedings, volume 96 of Lecture Notes of the Institute for ComputerSciences , Social-Informatics and Tele-communications Engineering (LNICST), pp.243-260, 2011. ,
DOI : 10.1007/3-540-45682-1_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.231.7868
RESTful web services. O'Reilly Series, 2007. ,
HAPADEP: Human-Assisted Pure Audio Device Pairing, Information Security, pp.385-400, 2008. ,
DOI : 10.1007/978-3-540-85886-7_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.6927
QR-TAN: Secure Mobile Transaction Authentication, 2009 International Conference on Availability, Reliability and Security, pp.578-583, 2009. ,
DOI : 10.1109/ARES.2009.96
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.2315
Efficient implementation of anonymous credentials on Java Card smart cards, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.106-110, 2009. ,
DOI : 10.1109/WIFS.2009.5386474
Amigo: Proximity-Based Authentication of Mobile Devices, Proceedings of the 9th international conference on Ubiquitous computing, UbiComp '07, pp.253-270, 2007. ,
DOI : 10.1007/978-3-540-74853-3_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.7188